Sciweavers

849 search results - page 128 / 170
» Similarity of business process models: Metrics and evaluatio...
Sort
View
IEEEARES
2009
IEEE
14 years 3 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
CLEAR
2007
Springer
144views Biometrics» more  CLEAR 2007»
14 years 2 months ago
The SRI-ICSI Spring 2007 Meeting and Lecture Recognition System
We describe the latest version of the SRI-ICSI meeting and lecture recognition system, as was used in the NIST RT-07 evaluations, highlighting improvements made over the last year....
Andreas Stolcke, Xavier Anguera, Kofi Boakye, &Oum...
PE
2010
Springer
133views Optimization» more  PE 2010»
13 years 7 months ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss
EMNLP
2009
13 years 6 months ago
Supervised Learning of a Probabilistic Lexicon of Verb Semantic Classes
The work presented in this paper explores a supervised method for learning a probabilistic model of a lexicon of VerbNet classes. We intend for the probabilistic model to provide ...
Yusuke Miyao, Jun-ichi Tsujii
CIKM
2005
Springer
14 years 2 months ago
Query workload-aware overlay construction using histograms
Peer-to-peer (p2p) systems offer an efficient means of data sharing among a dynamically changing set of a large number of autonomous nodes. Each node in a p2p system is connected...
Georgia Koloniari, Yannis Petrakis, Evaggelia Pito...